Publisher
Springer International Publishing
Reference19 articles.
1. Adomnicai, A., Fournier, J.J., Masson, L.: Masking the lightweight authenticated ciphers ACORN and Ascon in software. In: Tiplea, F.L., Warinschi, B. (eds.) Cryptography and Information Security in the Balkans. Springer, Cham (2018).
https://eprint.iacr.org/2018/708
2. Lecture Notes in Computer Science;A Biryukov,2016
3. Lecture Notes in Computer Science;E Brier,2004
4. Dey, P., Rohit, R.S., Adhikari, A.: Full key recovery of acorn with a single fault. J. Inf. Secur. Appl. 29(C), 57–64 (2016).
https://doi.org/10.1016/j.jisa.2016.03.003
5. Diehl, W., Abdulgadir, A., Farahmand, F., Kaps, J.P., Gaj, K.: Comparison of cost of protection against differential power analysis of selected authenticated ciphers. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 147–152, April 2018.
https://doi.org/10.1109/HST.2018.8383904
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach;Lecture Notes in Computer Science;2024
2. ASCA vs. SASCA;Constructive Side-Channel Analysis and Secure Design;2023
3. A New General Method of Searching for Cubes in Cube Attacks;Information and Communications Security;2020